메뉴 건너뛰기




Volumn , Issue , 2008, Pages 9-13

Privacy-preserving social network analysis for criminal investigations

Author keywords

Criminal investigations; Data sharing; Privacy; Social network analysis

Indexed keywords

CRIMINAL INVESTIGATION; CRIMINAL INVESTIGATIONS; DATA EXCHANGE; DATA SHARING; PLAINTEXT; PRIVACY; PRIVACY PRESERVING; PRIVATE INFORMATION; SOCIAL NETWORK ANALYSIS; SOCIAL NETWORKS;

EID: 70349244712     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456403.1456406     Document Type: Conference Paper
Times cited : (27)

References (27)
  • 1
    • 70349256703 scopus 로고    scopus 로고
    • Directive 95-46-EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Available at, 1995
    • Directive 95-46-EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Available at http://ec.europa.eu/justice-home/fsj/privacy, 1995.
    • e-home/fsj/privacy
  • 2
    • 70349242596 scopus 로고    scopus 로고
    • IBM Entity Analytic Solutions. Available at http://ibm.com/db2/eas, 2005.
    • IBM Entity Analytic Solutions. Available at http://ibm.com/db2/eas, 2005.
  • 5
    • 79960860547 scopus 로고    scopus 로고
    • Privacy-Preserving Graph Algorithms in the Semi-honest Model
    • J. Brickell, and V. Shmatikov. Privacy-Preserving Graph Algorithms in the Semi-honest Model. Proceedings of AsiaCrypt, 2005.
    • (2005) Proceedings of AsiaCrypt
    • Brickell, J.1    Shmatikov, V.2
  • 6
    • 0002626155 scopus 로고    scopus 로고
    • General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
    • R. Cramer, I. Damgard, and U. Maurer. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. Proceedings of EuroCrypt, 2000.
    • (2000) Proceedings of EuroCrypt
    • Cramer, R.1    Damgard, I.2    Maurer, U.3
  • 11
    • 0002908662 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • I. Damgard, and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Proceedings of Public Key Cryptography, 2001.
    • (2001) Proceedings of Public Key Cryptography
    • Damgard, I.1    Jurik, M.2
  • 13
    • 84945709831 scopus 로고
    • Algorithm 97: Shortest Path
    • R. Floyd. Algorithm 97: Shortest Path. Communications of the ACM 5(6), 1962.
    • (1962) Communications of the ACM , vol.5 , Issue.6
    • Floyd, R.1
  • 18
    • 0016494374 scopus 로고
    • The application of link analysis to police intelligence
    • W. Harper, and D. Harris. The application of link analysis to police intelligence. Human Factors 17(2), 1975.
    • (1975) Human Factors , vol.17 , Issue.2
    • Harper, W.1    Harris, D.2
  • 20
    • 0000277371 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Proceedings of EUROCRYPT, 1999.
    • (1999) Proceedings of EUROCRYPT
    • Paillier, P.1
  • 21
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S. Pohlig, and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 24, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24
    • Pohlig, S.1    Hellman, M.2
  • 23
    • 0012254042 scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • M. Sparrow. The application of network analysis to criminal intelligence: an assessment of the prospects. Social Networks 13, 1991.
    • (1991) Social Networks , vol.13
    • Sparrow, M.1
  • 26
    • 20344376408 scopus 로고    scopus 로고
    • Criminal Network Analysis and Visualization
    • J. Xu, and H. Chen. Criminal Network Analysis and Visualization. Communications of the ACM 48(6), 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.6
    • Xu, J.1    Chen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.